CISA Known Exploited Vulnerabilities Catalog

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.Y

    8.8

    CVSS31
    CVE-2017-8464 - Microsoft Windows Shell (.lnk) Remote Code Execution Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : Microsoft

    Description : Windows Shell in multiple versions of Microsoft Windows allows local users or remote attackers to execute arbitrary code via a crafted .LNK file

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-8464

    Alert Date: Feb 10, 2022 | 1167 days ago

    7.5

    CVSS31
    CVE-2017-10271 - Oracle Corporation WebLogic Server Remote Code Execution Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : Oracle

    Description : Oracle Corporation WebLogic Server contains a vulnerability that allows for remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-10271

    Alert Date: Feb 10, 2022 | 1167 days ago

    7.8

    CVSS31
    CVE-2017-0263 - Microsoft Win32k Privilege Escalation Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : Microsoft

    Description : Microsoft Win32k contains a privilege escalation vulnerability due to the Windows kernel-mode driver failing to properly handle objects in memory.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-0263

    Alert Date: Feb 10, 2022 | 1167 days ago

    7.8

    CVSS31
    CVE-2017-0262 - Microsoft Office Remote Code Execution Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : Microsoft

    Description : A remote code execution vulnerability exists in Microsoft Office.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-0262

    Alert Date: Feb 10, 2022 | 1167 days ago

    8.8

    CVSS31
    CVE-2017-0145 - Microsoft SMBv1 Remote Code Execution Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : Microsoft

    Description : The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-0145

    Alert Date: Feb 10, 2022 | 1167 days ago

    8.8

    CVSS31
    CVE-2017-0144 - Microsoft SMBv1 Remote Code Execution Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : Microsoft

    Description : The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-0144

    Alert Date: Feb 10, 2022 | 1167 days ago

    9.8

    CVSS31
    CVE-2016-3088 - Apache ActiveMQ Improper Input Validation Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : Apache

    Description : The Fileserver web application in Apache ActiveMQ allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2016-3088

    Alert Date: Feb 10, 2022 | 1167 days ago

    9.8

    CVSS31
    CVE-2015-1635 - Microsoft HTTP.sys Remote Code Execution Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : Microsoft

    Description : Microsoft HTTP protocol stack (HTTP.sys) contains a vulnerability that allows for remote code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2015-1635

    Alert Date: Feb 10, 2022 | 1167 days ago

    7.8

    CVSS31
    CVE-2015-1130 - Apple OS X Authentication Bypass Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : Apple

    Description : The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2015-1130

    Alert Date: Feb 10, 2022 | 1167 days ago

    7.8

    CVSS31
    CVE-2014-4404 - Apple OS X Heap-Based Buffer Overflow Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : Apple

    Description : Heap-based buffer overflow in IOHIDFamily in Apple OS X, which affects, iOS before 8 and Apple TV before 7, allows attackers to execute arbitrary code in a privileged context.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2014-4404

    Alert Date: Feb 10, 2022 | 1167 days ago

    7.8

    CVSS31
    CVE-2021-36934 - Microsoft Windows SAM Local Privilege Escalation Vulnerability -

    Action Due Feb 24, 2022 Target Vendor : Microsoft

    Description : If a Volume Shadow Copy (VSS) shadow copy of the system drive is available, users can read the SAM file which would allow any user to escalate privileges to SYSTEM level.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2021-36934

    Alert Date: Feb 10, 2022 | 1167 days ago

    10.0

    CVSS31
    CVE-2020-0796 - Microsoft SMBv3 Remote Code Execution Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : Microsoft

    Description : A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2020-0796

    Alert Date: Feb 10, 2022 | 1167 days ago

    9.8

    CVSS31
    CVE-2015-2051 - D-Link DIR-645 Router Remote Code Execution Vulnerability -

    Action Due Aug 10, 2022 Target Vendor : D-Link

    Description : D-Link DIR-645 Wired/Wireless Router allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.

    Action : The impacted product is end-of-life and should be disconnected if still in use.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2015-2051

    Alert Date: Feb 10, 2022 | 1167 days ago

    7.8

    CVSS31
    CVE-2022-21882 - Microsoft Win32k Privilege Escalation Vulnerability -

    Action Due Feb 18, 2022 Target Vendor : Microsoft

    Description : Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-21882

    Alert Date: Feb 04, 2022 | 1173 days ago

    9.8

    CVSS31
    CVE-2022-22587 - Apple Memory Corruption Vulnerability -

    Action Due Feb 11, 2022 Target Vendor : Apple

    Description : Apple IOMobileFrameBuffer contains a memory corruption vulnerability which can allow a malicious application to execute arbitrary code with kernel privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2022-22587

    Alert Date: Jan 28, 2022 | 1180 days ago

    9.8

    CVSS31
    CVE-2021-20038 - SonicWall SMA 100 Appliances Stack-Based Buffer Overflow Vulnerability -

    Action Due Feb 11, 2022 Target Vendor : SonicWall

    Description : SonicWall SMA 100 devies are vulnerable to an unauthenticated stack-based buffer overflow vulnerability where exploitation can result in code execution.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2021-20038

    Alert Date: Jan 28, 2022 | 1180 days ago

    9.8

    CVSS31
    CVE-2020-5722 - Grandstream Networks UCM6200 Series SQL Injection Vulnerability -

    Action Due Jul 28, 2022 Target Vendor : Grandstream

    Description : Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. Exploitation can allow for code execution as root.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2020-5722

    Alert Date: Jan 28, 2022 | 1180 days ago

    7.8

    CVSS31
    CVE-2020-0787 - Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability -

    Action Due Jul 28, 2022 Target Vendor : Microsoft

    Description : Microsoft Windows BITS is vulnerable to to a privilege elevation vulnerability if it improperly handles symbolic links. An actor can exploit this vulnerability to execute arbitrary code with system-level privileges.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Known

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2020-0787

    Alert Date: Jan 28, 2022 | 1180 days ago

    9.8

    CVSS31
    CVE-2017-5689 - Intel Active Management Technology (AMT), Small Business Technology (SBT), and Standard Manageability Privilege Escalation Vulnerability -

    Action Due Jul 28, 2022 Target Vendor : Intel

    Description : Intel products contain a vulnerability which can allow attackers to perform privilege escalation.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2017-5689

    Alert Date: Jan 28, 2022 | 1180 days ago

    9.8

    CVSS31
    CVE-2014-6271 - GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability -

    Action Due Jul 28, 2022 Target Vendor : GNU

    Description : GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code.

    Action : Apply updates per vendor instructions.

    Known To Be Used in Ransomware Campaigns? : Unknown

    Notes : https://nvd.nist.gov/vuln/detail/CVE-2014-6271

    Alert Date: Jan 28, 2022 | 1180 days ago
Showing 20 of 1325 Results

Filters

© cvefeed.io
Latest DB Update: Apr. 22, 2025 18:06